From bdafc6df04d650518525e8e4bb27d442a60a339a Mon Sep 17 00:00:00 2001 From: Nathan Zadoks Date: Tue, 3 May 2016 10:42:29 -0400 Subject: [PATCH] openssl: 1.0.1s -> 1.0.1t, 1.0.2g -> 1.0.2h CVE-2016-2108, high severity: Memory corruption in the ASN.1 encoder CVE-2016-2107, high severity: Padding oracle in AES-NI CBC MAC check CVE-2016-2105, low severity: EVP_EncodeUpdate overflow CVE-2016-2106, low severity: EVP_EncryptUpdate overflow CVE-2016-2109, low severity: ASN.1 BIO excessive memory allocation CVE-2016-2176, low severity: EBCDIC overread --- pkgs/development/libraries/openssl/default.nix | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/pkgs/development/libraries/openssl/default.nix b/pkgs/development/libraries/openssl/default.nix index 1e0f419c5f73..fa84b89bd389 100644 --- a/pkgs/development/libraries/openssl/default.nix +++ b/pkgs/development/libraries/openssl/default.nix @@ -105,13 +105,13 @@ let in { openssl_1_0_1 = common { - version = "1.0.1s"; - sha256 = "e7e81d82f3cd538ab0cdba494006d44aab9dd96b7f6233ce9971fb7c7916d511"; + version = "1.0.1t"; + sha256 = "4a6ee491a2fdb22e519c76fdc2a628bb3cec12762cd456861d207996c8a07088"; }; openssl_1_0_2 = common { - version = "1.0.2g"; - sha256 = "b784b1b3907ce39abf4098702dade6365522a253ad1552e267a9a0e89594aa33"; + version = "1.0.2h"; + sha256 = "1d4007e53aad94a5b2002fe045ee7bb0b3d98f1a47f8b2bc851dcd1c74332919"; }; }